Skip to main content

What Every Integrator Should Know About Interoperability

Interoperability, by simple definition, means the ability of computer systems or software to exchange and make use of information. But when it comes to network security — and cybersecurity in particular — things aren’t quite as simple. Video surveillance and access control systems are encompassing an ever-broadening spectrum of subsystems, such as visitor management, intrusion, […]

Tax Reform Becomes Reality

Are you ready for tax reform? On Dec. 22, 2017, President Trump signed the “Tax Cuts and Jobs Act” (TCJA) into law, meaning the tax rate for incorporated security dealers, integrators and businesses will be reduced from its current 35-percent rate to 21 percent for the 2018 tax year and thereafter. The new tax code […]

Facial recognition crosses both security, consumer applications

The on again, off again love affair with biometrics in general and facial recognition, in particular, has been playing out for almost two decades. A wide range of security solutions was laid at the doorstep of the Department of Homeland of Security following the Sept. 11 terrorist attacks. Of them all, biometrics became the sweetheart […]

Executive Perspectives

Last month, ASIS International announced that it would be changing the name of its flagship annual security conference from the ASIS Annual Seminar and Exhibits to the Global Security Exchange (GSX). The name change is intended to reflect the ongoing shift that is occurring both inside the organization and the industry as a whole, which has gone […]

Perimeter Protection in the Great Outdoors

 ·Perimeters of buildings and grounds can vary significantly, from suburban areas with open space surrounded only by trees and landscaping to industrial sites with fenced-in facilities or to urban environments bordered by sidewalks, roadways and parking lots. Technology for protecting these facilities varies as widely as the perimeters themselves, but the key to detecting and […]

Building a Stronger Security Culture to Mitigate Risk

By Lance Hayden. According to Lance Hayden, Managing Director of Berkeley Research Group, harnessing the power of people and culture is the next great frontier for information security. Security culture reflects the beliefs and values of the people that make up your organization. They are intangible and embedded in thoughts and minds. An organization can’t […]

Rack Rate

When warehouse managers are told they need to install in-rack sprinklers, they usually react with trepidation and dismay. Who can blame them? Although in-rack sprinklers have been successfully used to protect storage racks for more than five decades, protection guidelines have historically required the installation of a large number of sprinklers, making this type of […]

Page 3 of 11« First...234...10...Last »
Want to place your system on test with the central station? Click here
Would you like to build your inspection reports? Click here
Read the Red Hawk Observer Newsletter Articles. Click here
Would you like a free, no obligation survey of your business? Click here

*Not all services shown on our website are available in all jurisdictions. Please check with your local Red Hawk office to determine which services can be performed by the Red Hawk office in your area.
logo_ul_listed logo_csaa logo_sia SDM100 FAST50